Font Size: a A A

Design And Implementation Of An Automated Penetration Testing System From Extranet To Intranet

Posted on:2022-10-13Degree:MasterType:Thesis
Country:ChinaCandidate:X Q XuFull Text:PDF
GTID:2518306338468494Subject:Computer technology
Abstract/Summary:PDF Full Text Request
The rapid development of Internet technology not only provides great convenience to human production and life,but also brings huge challenges on network security.The penetration testing technology detects system vulnerabilities by simulating malicious hacker attack methods,which can quickly discover security issues in the network and avoid irreversible losses.In recent years,the network security industry is developing at top speed and numerous penetration testing tools have emerged,which greatly facilitates the work of penetration testers for security testing of corporate networks.However,most tools only perform penetration testing on networks that are directly accessible,but the vast majority of security problems are often exist in the Intranet that the testing tools cannot directly access.To solve this problem,in this article,an automated penetration testing system combining the PTES penetration testing execution standard and ATT&CK attack matrix model from Extranet to Intranet is designed and implemented.There are six parts in the system:information collection,vulnerability detection,vulnerability exploitation,privilege escalation,post-penetration testing and trace cleaning.During the information gathering process,the system will collect sub-domain information,port scanning and service detection for a given target,and CMS fingerprint identification is performed for website services particularly,which lays the foundation for vulnerability detection and exploitation.During the post-penetration testing process,in order to avoid the inspection of WAF,IDS,IPS and other security devices,the covert channel based on HTTP protocol is constructed,and the traffic forwarding path from Extranet to Intranet is opened,which enables automated security testing of the intranet.During the trace cleaning process,the temporary files generated in the penetration testing sessions will be automatically cleaned up by the system,in order to prevent these files from being maliciously used by others.This paper simulates the intranet topology of small and medium-sized enterprises,constructs a vulnerable shooting range environment,and conducts a system function test in this environment.As the test experiments shown,in this system,the functions of automatically discovering the security vulnerabilities of external network,automatically constructing the Intranet and Extranet traffic forwarding channel,and further automated penetration testing on the intranet are achieved.The standard of automatic,comprehensive,efficient and accurate vulnerability detection on the Intranet and Extranet of the enterprise is reached,so as to assist enterprises to fix the loopholes and strengthen the network as soon as possible,and avoid serious losses caused by security loopholes.
Keywords/Search Tags:Network Security, Automated Penetration Testing, Covert Channels, Intranet Testing
PDF Full Text Request
Related items